메뉴 건너뛰기




Volumn 1, Issue 3, 2014, Pages 27-33

Enhancing big data security with collaborative intrusion detection

Author keywords

big data; cloud; collaborative intrusion detection; security and privacy

Indexed keywords

BIG DATA; CLOUD COMPUTING; CLOUDS; DATA PRIVACY; DECISION MAKING; INTRUSION DETECTION;

EID: 84923253472     PISSN: None     EISSN: 23256095     Source Type: Trade Journal    
DOI: 10.1109/MCC.2014.53     Document Type: Article
Times cited : (77)

References (15)
  • 1
    • 84886723209 scopus 로고    scopus 로고
    • A survey on security issues and solutions at different layers of cloud computing
    • C. Modi et al., "A Survey on Security Issues and Solutions at Different Layers of Cloud Computing," J. Supercomputing, vol. 63, no. 2, 2013, pp. 561-592.
    • (2013) J. Supercomputing , vol.63 , Issue.2 , pp. 561-592
    • Modi, C.1
  • 2
    • 79956118096 scopus 로고    scopus 로고
    • Seamless integration of dependability and security concepts in soa: A feedback control system based framework and taxonomy
    • J. Hu et al., "Seamless Integration of Dependability and Security Concepts in SOA: A Feedback Control System Based Framework and Taxonomy," J. Network and Computer Applications, vol. 34, no. 4, 2011, pp. 1150-1159.
    • (2011) J. Network and Computer Applications , vol.34 , Issue.4 , pp. 1150-1159
    • Hu, J.1
  • 3
    • 84887090951 scopus 로고    scopus 로고
    • Towards adaptive character frequency-based exclusive signature matching scheme and its applications in distributed intrusion detection
    • Y. Meng, W. Li, and L.-F. Kwok, "Towards Adaptive Character Frequency-Based Exclusive Signature Matching Scheme and Its Applications in Distributed Intrusion Detection," Computer Networks, vol. 57, no. 17, 2013, pp. 3630-3640.
    • (2013) Computer Networks , vol.57 , Issue.17 , pp. 3630-3640
    • Meng, Y.1    Li, W.2    Kwok, L.-F.3
  • 4
    • 84897137099 scopus 로고    scopus 로고
    • A semantic approach to host-based intrusion detection systems using contiguous and discontiguous system call patterns
    • G. Creech and J. Hu, "A Semantic Approach to Host-Based Intrusion Detection Systems Using Contiguous and Discontiguous System Call Patterns," IEEE Trans. Computers, vol. 63, no. 4, 2014, pp. 807-819.
    • (2014) IEEE Trans. Computers , vol.63 , Issue.4 , pp. 807-819
    • Creech, G.1    Hu, J.2
  • 5
    • 84891816613 scopus 로고    scopus 로고
    • A system for denial-of-service attack detection based on multivariate correlation analysis
    • Z. Tan et al., "A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis," IEEE Trans. Parallel and Distributed Systems, vol. 25, no. 2, 2014, pp. 447-456.
    • (2014) IEEE Trans. Parallel and Distributed Systems , vol.25 , Issue.2 , pp. 447-456
    • Tan, Z.1
  • 7
    • 84870661024 scopus 로고    scopus 로고
    • Secure cloud computing based on mutual intrusion detection system
    • S. Ram, "Secure Cloud Computing Based on Mutual Intrusion Detection System," Int'l J. Computer Application, vol. 2, no. 1, 2012, pp. 57-67.
    • (2012) Int'l J. Computer Application , vol.2 , Issue.1 , pp. 57-67
    • Ram, S.1
  • 8
    • 84903436399 scopus 로고    scopus 로고
    • Intrusion detection system in cloud computing environment
    • S.N. Dhage and B. Meshram, "Intrusion Detection System in Cloud Computing Environment," Int'l J. Cloud Computing, vol. 1, no. 2, 2012, pp. 261-282.
    • (2012) Int'l J. Cloud Computing , vol.1 , Issue.2 , pp. 261-282
    • Dhage, S.N.1    Meshram, B.2
  • 10
    • 84870667876 scopus 로고    scopus 로고
    • An intrusion detection and prevention system in cloud computing: A systematic review
    • A. Patel et al., "An Intrusion Detection and Prevention System in Cloud Computing: A Systematic Review," J. Network and Computer Applications, vol. 36, no. 1, 2013, pp. 25-41.
    • (2013) J. Network and Computer Applications , vol.36 , Issue.1 , pp. 25-41
    • Patel, A.1
  • 11
    • 0010818929 scopus 로고    scopus 로고
    • tech. report, Dept. of Computer Science, Univ. of Virginia
    • A.K. Jones and R.S. Sielken, Computer System Intrusion Detection: A Survey, tech. report, Dept. of Computer Science, Univ. of Virginia, 2000; http://atlas.cs.virginia.edu/jones/IDS-research/ Documents/jones-sielken-survey-v11.pdf.
    • (2000) Computer System Intrusion Detection: A Survey
    • Jones, A.K.1    Sielken, R.S.2
  • 13
    • 37549003336 scopus 로고    scopus 로고
    • Map reduce: Simplified data processing on large clusters
    • J. Dean and S. Ghemawat, "MapReduce: Simplified Data Processing on Large Clusters," Comm. ACM, vol. 51, no. 1, 2008, pp. 107-113.
    • (2008) Comm. ACM , vol.51 , Issue.1 , pp. 107-113
    • Dean, J.1    Ghemawat, S.2
  • 14
    • 78649318959 scopus 로고    scopus 로고
    • A mutual-healing key distribution scheme in wireless sensor networks
    • B. Tian et al., "A Mutual-Healing Key Distribution Scheme in Wireless Sensor Networks," J. Network and Computer Applications, vol. 34, no. 1, 2011, pp. 80-88.
    • (2011) J. Network and Computer Applications , vol.34 , Issue.1 , pp. 80-88
    • Tian, B.1
  • 15
    • 79953833858 scopus 로고    scopus 로고
    • Self-healing key distribution schemes for wireless networks: A survey
    • B. Tian et al., "Self-Healing Key Distribution Schemes for Wireless Networks: A Survey," Computer J., vol. 54, no. 4, 2011, pp. 549-569.
    • (2011) Computer J. , vol.54 , Issue.4 , pp. 549-569
    • Tian, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.